Risk
10/29/2012
01:28 PM
Connect Directly
RSS
E-Mail
50%
50%

Intel Joins SAFECode

Intel joins a group of committed contributors and software industry leaders

WAKEFIELD, Mass., Oct. 29, 2012 /PRNewswire/ -- The Software Assurance Forum for Excellence in Code (SAFECode), a non-profit organization exclusively dedicated to increasing trust in information and communications technology products and services through the advancement of effective security assurance methods, today announced Intel® Corporation as its newest member. With membership, Intel joins a group of committed contributors and software industry leaders including Adobe Systems Incorporated, EMC Corporation, Juniper Networks, Inc., Microsoft Corp., Nokia, SAP AG, Siemens and Symantec Corp.

SAFECode is the first global, industry-led effort to identify and promote best practices for developing and delivering more secure and reliable software, hardware and services. In the first five years, the Forum has worked to aggressively advance an agenda that has measurably improved software security practices worldwide. Most recently, the Forum launched its Software Security Guidance for Agile Practitioners.

"The rapid advancement of threats has driven security requirements across - and more deeply within - systems than ever before," said Stacy Simpson, policy and communications director, SAFECode. "Intel's innovations and strength in embedding security at the foundation of computing devices brings another level of expertise and perspective to our efforts."

Jeffrey H. Cohen, Head of Product Security Assurance for Intel, will join SAFECode's Board of Directors and play an active role in the leadership of the association. As a new member, Intel will contribute to SAFECode's ongoing efforts to identify, share and promote security assurance best practices based on the lessons learned from real-world implementations - and will take an active role in current SAFECode projects that address secure development methods and training.

Membership in SAFECode is open to commercial technology providers with significant global business activity in hardware, software and/or services and that have demonstrated a commitment, and dedicated resources, to software assurance. For more information, please visit www.safecode.org.

About SAFECode The Software Assurance Forum for Excellence in Code (SAFECode) is a non-profit organization exclusively dedicated to increasing trust in information and communications technology products and services through the advancement of effective software assurance methods. SAFECode is a global, industry-led effort to identify and promote best practices for developing and delivering more secure and reliable software, hardware and services. Its members include Adobe Systems Incorporated, EMC Corporation, Juniper Networks, Inc., Microsoft Corp., Nokia, SAP AG, Siemens AG and Symantec Corp. For more information, please visit www.safecode.org.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.